Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(565)

Unified Diff: net/proxy/proxy_service_unittest.cc

Issue 1735203002: Revert of Moving proxy resolution logic out of NetworkDelegate and into ProxyDelegate (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/proxy/proxy_service.cc ('k') | net/url_request/url_request_test_util.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/proxy/proxy_service_unittest.cc
diff --git a/net/proxy/proxy_service_unittest.cc b/net/proxy/proxy_service_unittest.cc
index a9cb9ed5acf5a12d6e73ca1a269ecb8daae1eb12..3d23b583345cf2d533307e9b410d4acf2597ee3a 100644
--- a/net/proxy/proxy_service_unittest.cc
+++ b/net/proxy/proxy_service_unittest.cc
@@ -14,7 +14,7 @@
#include "base/strings/utf_string_conversions.h"
#include "net/base/load_flags.h"
#include "net/base/net_errors.h"
-#include "net/base/proxy_delegate.h"
+#include "net/base/network_delegate_impl.h"
#include "net/base/test_completion_callback.h"
#include "net/log/net_log.h"
#include "net/log/test_net_log.h"
@@ -162,13 +162,14 @@
};
// A test network delegate that exercises the OnResolveProxy callback.
-class TestResolveProxyDelegate : public ProxyDelegate {
+class TestResolveProxyNetworkDelegate : public NetworkDelegateImpl {
public:
- TestResolveProxyDelegate()
+ TestResolveProxyNetworkDelegate()
: on_resolve_proxy_called_(false),
add_proxy_(false),
remove_proxy_(false),
- proxy_service_(nullptr) {}
+ proxy_service_(NULL) {
+ }
void OnResolveProxy(const GURL& url,
int load_flags,
@@ -200,23 +201,6 @@
return proxy_service_;
}
- void OnTunnelConnectCompleted(const HostPortPair& endpoint,
- const HostPortPair& proxy_server,
- int net_error) override {}
- void OnFallback(const ProxyServer& bad_proxy, int net_error) override {}
- void OnBeforeSendHeaders(URLRequest* request,
- const ProxyInfo& proxy_info,
- HttpRequestHeaders* headers) override {}
- void OnBeforeTunnelRequest(const HostPortPair& proxy_server,
- HttpRequestHeaders* extra_headers) override {}
- void OnTunnelHeadersReceived(
- const HostPortPair& origin,
- const HostPortPair& proxy_server,
- const HttpResponseHeaders& response_headers) override {}
- bool IsTrustedSpdyProxy(const net::ProxyServer& proxy_server) override {
- return true;
- }
-
private:
bool on_resolve_proxy_called_;
bool add_proxy_;
@@ -225,35 +209,18 @@
};
// A test network delegate that exercises the OnProxyFallback callback.
-class TestProxyFallbackProxyDelegate : public ProxyDelegate {
+class TestProxyFallbackNetworkDelegate : public NetworkDelegateImpl {
public:
- TestProxyFallbackProxyDelegate()
- : on_proxy_fallback_called_(false), proxy_fallback_net_error_(OK) {}
-
- // ProxyDelegate implementation:
- void OnResolveProxy(const GURL& url,
- int load_flags,
- const ProxyService& proxy_service,
- ProxyInfo* result) override {}
- void OnTunnelConnectCompleted(const HostPortPair& endpoint,
- const HostPortPair& proxy_server,
- int net_error) override {}
- void OnFallback(const ProxyServer& bad_proxy, int net_error) override {
- proxy_server_ = bad_proxy;
+ TestProxyFallbackNetworkDelegate()
+ : on_proxy_fallback_called_(false),
+ proxy_fallback_net_error_(OK) {
+ }
+
+ void OnProxyFallback(const ProxyServer& proxy_server,
+ int net_error) override {
+ proxy_server_ = proxy_server;
proxy_fallback_net_error_ = net_error;
on_proxy_fallback_called_ = true;
- }
- void OnBeforeSendHeaders(URLRequest* request,
- const ProxyInfo& proxy_info,
- HttpRequestHeaders* headers) override {}
- void OnBeforeTunnelRequest(const HostPortPair& proxy_server,
- HttpRequestHeaders* extra_headers) override {}
- void OnTunnelHeadersReceived(
- const HostPortPair& origin,
- const HostPortPair& proxy_server,
- const HttpResponseHeaders& response_headers) override {}
- bool IsTrustedSpdyProxy(const net::ProxyServer& proxy_server) override {
- return true;
}
bool on_proxy_fallback_called() const {
@@ -399,13 +366,13 @@
EXPECT_EQ(OK, rv);
// Verify that network delegate is invoked.
- TestResolveProxyDelegate delegate;
+ TestResolveProxyNetworkDelegate delegate;
rv = service.ResolveProxy(url, LOAD_NORMAL, &info, callback.callback(), NULL,
&delegate, log.bound());
EXPECT_TRUE(delegate.on_resolve_proxy_called());
EXPECT_EQ(&service, delegate.proxy_service());
- // Verify that the ProxyDelegate's behavior is stateless across
+ // Verify that the NetworkDelegate's behavior is stateless across
// invocations of ResolveProxy. Start by having the callback add a proxy
// and checking that subsequent requests are not affected.
delegate.set_add_proxy(true);
@@ -431,7 +398,7 @@
TEST_F(ProxyServiceTest, OnResolveProxyCallbackRemoveProxy) {
// Same as OnResolveProxyCallbackAddProxy, but verify that the
- // ProxyDelegate's behavior is stateless across invocations after it
+ // NetworkDelegate's behavior is stateless across invocations after it
// *removes* a proxy.
ProxyConfig config;
config.proxy_rules().ParseFromString("foopy1:8080");
@@ -453,7 +420,7 @@
NULL, NULL, log.bound());
EXPECT_EQ(OK, rv);
- TestResolveProxyDelegate delegate;
+ TestResolveProxyNetworkDelegate delegate;
delegate.set_remove_proxy(true);
// Callback should interpose:
@@ -609,12 +576,12 @@
// Now, imagine that connecting to foopy:8080 fails: there is nothing
// left to fallback to, since our proxy list was NOT terminated by
// DIRECT.
- TestResolveProxyDelegate proxy_delegate;
+ NetworkDelegateImpl network_delegate;
TestCompletionCallback callback2;
ProxyServer expected_proxy_server = info.proxy_server();
rv = service.ReconsiderProxyAfterError(
url, LOAD_NORMAL, ERR_PROXY_CONNECTION_FAILED, &info,
- callback2.callback(), NULL, &proxy_delegate, BoundNetLog());
+ callback2.callback(), NULL, &network_delegate, BoundNetLog());
// ReconsiderProxyAfterError returns error indicating nothing left.
EXPECT_EQ(ERR_FAILED, rv);
EXPECT_TRUE(info.is_empty());
@@ -723,12 +690,12 @@
EXPECT_EQ("foobar:10", info.proxy_server().ToURI());
// Fallback 2.
- TestResolveProxyDelegate proxy_delegate;
+ NetworkDelegateImpl network_delegate;
ProxyServer expected_proxy_server3 = info.proxy_server();
TestCompletionCallback callback3;
rv = service.ReconsiderProxyAfterError(
url, LOAD_NORMAL, ERR_PROXY_CONNECTION_FAILED, &info,
- callback3.callback(), NULL, &proxy_delegate, BoundNetLog());
+ callback3.callback(), NULL, &network_delegate, BoundNetLog());
EXPECT_EQ(OK, rv);
EXPECT_TRUE(info.is_direct());
@@ -737,7 +704,7 @@
TestCompletionCallback callback4;
rv = service.ReconsiderProxyAfterError(
url, LOAD_NORMAL, ERR_PROXY_CONNECTION_FAILED, &info,
- callback4.callback(), NULL, &proxy_delegate, BoundNetLog());
+ callback4.callback(), NULL, &network_delegate, BoundNetLog());
EXPECT_EQ(OK, rv);
EXPECT_FALSE(info.is_direct());
EXPECT_EQ("foobar:20", info.proxy_server().ToURI());
@@ -747,7 +714,7 @@
TestCompletionCallback callback5;
rv = service.ReconsiderProxyAfterError(
url, LOAD_NORMAL, ERR_PROXY_CONNECTION_FAILED, &info,
- callback5.callback(), NULL, &proxy_delegate, BoundNetLog());
+ callback5.callback(), NULL, &network_delegate, BoundNetLog());
EXPECT_EQ(ERR_FAILED, rv);
EXPECT_TRUE(info.is_empty());
}
@@ -1208,7 +1175,7 @@
EXPECT_EQ("foopy2:9090", info.proxy_server().ToURI());
// Report back that the second proxy worked. This will globally mark the
// first proxy as bad.
- TestProxyFallbackProxyDelegate test_delegate;
+ TestProxyFallbackNetworkDelegate test_delegate;
service.ReportSuccess(info, &test_delegate);
EXPECT_EQ("foopy1:8080", test_delegate.proxy_server().ToURI());
EXPECT_EQ(ERR_PROXY_CONNECTION_FAILED,
« no previous file with comments | « net/proxy/proxy_service.cc ('k') | net/url_request/url_request_test_util.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698